Exploitation Phase

Now that we've successfully completed Task 6 — gaining valid credentials (username + password) for the domain user alfredo — we are no longer just passive observers. We now have real access to the network.

🛠️ What Comes Next?

With domain credentials in hand, our next phase shifts to Active Directory enumeration and exploitation.

Here’s how we’ll proceed:

  • Enumerating AD relationships (ldapdomaindump, bloodhound-python)

  • Escalating privileges using built-in trust paths (net rpc, winPEAS) .

  • Achieving full control of the system and domain.

Last updated